Stealthy KV-botnet hijacks SOHO routers and VPN devices
The Chinese state-sponsored APT hacking group known as Volt Typhoon (Bronze Silhouette) has been linked to a sophisticated botnet named ‘KV-botnet’ it has been used since at least 2022 to…
Your Go-To Source for Cyber Security Insights and Solutions
The Chinese state-sponsored APT hacking group known as Volt Typhoon (Bronze Silhouette) has been linked to a sophisticated botnet named ‘KV-botnet’ it has been used since at least 2022 to…
Tired of Complex Passwords? Try Passphrases Instead! Are you frustrated with creating and remembering complicated passwords filled with random characters, symbols, and numbers? There’s a smarter solution—passphrases! The Problem with…
Krasue infects telecom firms in Thailand using techniques for staying under the radar. Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for two years…
The Open Web Application Security Project maintains a regularly updated list of the most pressing security concerns. What is OWASP? The Open Web Application Security Project, or OWASP, is an…
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
Token-based authentication is one way to confirm a user’s or device’s identity. It relies on checking whether the entity possesses a previously issued token. What is token-based authentication? Token-based authentication…
Authentication is the process of verifying identity. It requires using passwords, hardware tokens, or several other methods. In cyber security, authentication is verifying someone’s or something’s identity. Authentication usually occurs…
With two-factor authentication (2FA), users must prove their identity through two different means before being granted access. What is two-factor authentication? Two-factor authentication, abbreviated as 2FA, is an authentication process…
Attackers can poison a DNS cache by tricking DNS resolvers into caching false information, resulting in the resolver sending the wrong IP address to clients, and users attempting to navigate…
Identity and access management (IAM) solutions protect company data even when employees do not enter the office. What are the security challenges of a remote workforce? In an on-premise working…